The Internet of Things has made it easier than ever to set up a smart home in which you can remotely control your door locks, lights, thermostats, vacuums, lawnmowers, and even pet feeders, using your smartphone and an app. It’s also made it simple (and relatively affordable) to monitor your home from pretty much anywhere.

We’ve all heard about the benefits of cloud infrastructure: improved productivity, cost savings, efficiency, agility and a host of other buzzwords that paint cloud as the be all, end all for IT. Most organisations today either already run workloads in the cloud or plan to experiment with cloud in the very near future. And it’s

In today’s business landscape, the importance of application security has emerged as a leading factor impacting a company’s brand perception and even its bottom line. Yet somehow, despite the exponential growth of digitilization, security protocol rarely acknowledges just how much critical information is in the cloud or other software environments. In a recent whitepaper, entitled

A connected home is networked to enable the interconnection and interoperability of multiple devices, services and apps, ranging from communications and entertainment to healthcare, security and home automation. These services and apps are delivered over multiple interlinked and integrated devices, sensors, tools and platforms. Connected, real-time, smart and contextual experiences are provided for the household

1. There are too many “corner cases.” While driver less cars have demonstrated remarkable proficiency in many aspects of driving, some contend that many driving scenarios will remain unsolved. MIT’s John Leonard, for example, points to left hand turns into heavy traffic, adverse weather, changes to road surfaces, and eye and hand gestures as open

With autonomous vehicles and connected cars already starting to hit the roads of cities across the globe, the potential benefits and challenges of this mobility revolution are being scrutinized in increasing detail. Research from Ohio University​ has highlighted just some of the potential ways that driverless cars could improve our lives – whether it’s by

There were a lot of application security-related news headlines in 2017 – from the Equifax breach, to WannaCry, to WordPress and Oracle – insecure software was everywhere. But from our perspective, there wasn’t much “new” in this “news” – it was the same security-related coding defects we’ve been seeing for more than 10 years, still

Even though they’re barely on the road, self-driving cars have been talked about so much that they already seem like they’re last year’s model. Google has been working on one for years. Apple is allegedly, possibly, working on one, too. And there’s even speculation that everyone from Uber to Tesla could join the race, too.

The terms ‘application security’ and ‘software security’ are often used interchangeably. However, there is in fact a difference between the two. Information security pioneer, Gary McGraw, maintains that application security is a reactive approach, taking place once software has been deployed. Software security, on the other hand, involves a proactive approach, taking place within the

To perfect self-driving cars, companies in the AV space are now working on different approaches, focused on perception, mapping, and localization. Perception. The goal—to achieve reliable levels of perception with the smallest number of test and validation miles needed. Two approaches are vying to win this race. Radar, sonar, and cameras. To perceive vehicles and